Avoiding the Scam! I’ve Got a Favor to Ask
Cybersecurity Situations & Awareness
Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.
Learning Paths & Details
- Ethics & Compliance
- Personal Performance
- Type: Video Vignettes
- Audience: General
- Available As: Download, USB, USB-2YR, USB-3YR
Suggested Industry Usage
Competencies
- Developing Critical Work Skills
- Developing High-Performing Work Habits
- Managing Risk
Buying Options
Training Files (8)
Type | Time/Pages | Language | ||
---|---|---|---|---|
Video Vignette | 03:09 min | English | Demo | |
Workshop Material | 4 pages | English | Demo | |
Workshop Material | 2 pages | English | Demo |
Additional Information
Here are some other things to consider when dealing with possible scams:
- While you can’t control whether an email address has been hacked, you should use proven processes to ensure and verify the validity of high-dollar requests. Additional verification would have revealed that the client did not actually request that funds be transferred.
- Question email requests to transfer money that also say the sender will be unavailable for a period of time to confirm the transaction. Fraudsters depend on speed, and count on employees to not think too much about an individual transaction.
- Follow procedures. You should try to verify the accuracy of any request to transfer money or personally identifiable information (PII) by phone or email.